Microsoft released an out‑of‑band cumulative update for Windows 11 version 24H2 on September 22, 2025 — KB5068221 (OS Build 26100.6588) — that bundles quality fixes (including the fixes from the September 9, 2025 security rollup), updates several AI components, and quietly re‑emphasizes the looming Secure Boot certificate expiration program affecting many devices next year.
Microsoft’s September servicing cycle already shipped a large September 9, 2025 security rollup (LCU + SSU) that addressed dozens of vulnerabilities across Windows client and server families. The September 22 out‑of‑band release (KB5068221) is a small, targeted cumulative update for Windows 11 24H2 that consolidates the earlier security fixes and adds a narrow set of quality corrections flagged after the Patch Tuesday release. This pattern — a rapid follow‑up cumulative packaged as an out‑of‑band update — is intended to address post‑release regressions or compatibility issues surfaced by customers and telemetry.
Microsoft explicitly lists the release date (September 22, 2025), the target build (OS Build 26100.6588), and the product scope (Windows 11 version 24H2, all editions) in the public KB article. The KB also bundles a servicing stack update (SSU) — KB5064531 — with a reported SSU build of 26100.5074, and it provides file lists and component version metadata administrators can use for inventory and validation.
From an operational standpoint, the update is constructive: it addresses a real compatibility pain point and keeps devices on a supported servicing posture. At the same time, the SSU+LCU packaging model and the SM Bv1 regression underline the need for careful piloting, clear rollback runbooks (DISM‑based), and an accelerated plan to retire legacy SMBv1/NetBT dependencies. Enterprises should also treat the Secure Boot certificate rotation as a high‑impact program that will require coordination across firmware vendors, IT operations, and change management processes.
Administrators and power users should read the KB, download the file information Microsoft publishes, pilot the update on representative systems (particularly App‑V and VDI images), and start or continue Secure Boot certificate readiness activities well ahead of June 2026.
KB5068221 is available via Windows Update and the business distribution channels Microsoft lists in the KB; check your update management tooling for the package and ensure your inventory and compliance records reflect the new OS Build (26100.6588) after deployment.
Source: Microsoft Support September 22, 2025—KB5068221 (OS Build 26100.6588) Out-of-band - Microsoft Support
Background
Microsoft’s September servicing cycle already shipped a large September 9, 2025 security rollup (LCU + SSU) that addressed dozens of vulnerabilities across Windows client and server families. The September 22 out‑of‑band release (KB5068221) is a small, targeted cumulative update for Windows 11 24H2 that consolidates the earlier security fixes and adds a narrow set of quality corrections flagged after the Patch Tuesday release. This pattern — a rapid follow‑up cumulative packaged as an out‑of‑band update — is intended to address post‑release regressions or compatibility issues surfaced by customers and telemetry. Microsoft explicitly lists the release date (September 22, 2025), the target build (OS Build 26100.6588), and the product scope (Windows 11 version 24H2, all editions) in the public KB article. The KB also bundles a servicing stack update (SSU) — KB5064531 — with a reported SSU build of 26100.5074, and it provides file lists and component version metadata administrators can use for inventory and validation.
What’s in KB5068221 (26100.6588)
Improvements and fixes (high‑level)
- The update is cumulative and includes the security fixes and improvements shipped in the September 9, 2025 cumulative (KB5065426).
- Primary targeted fix called out by Microsoft: an App‑V (Microsoft Application Virtualization) compatibility fix for Microsoft Office running in App‑V environments. Microsoft says the failure was caused by a double handle closure in the AppVEntSubsystems32 or AppVEntSubsystems64 components; KB5068221 corrects that behavior.
- The package updates a set of AI components (Image Search, Content Extraction, Semantic Analysis, Settings Model) to version 1.2508.906.0 in this rollup; Microsoft lists component versions in the KB so administrators can verify installed component versions after deployment.
- The combined SSU + LCU packaging remains in effect for this update; Microsoft reiterates that the servicing stack (SSU) cannot be uninstalled once applied and that administrators must use DISM to remove only the LCU portion if rollback is required.
Known issues documented in KB5068221
Microsoft documents at least one known issue in the public KB:- SMBv1 protocol connectivity break when SMB over NetBIOS (NetBT) is used after systems receive the September 2025 updates. The symptom is that SMBv1 shares accessed via NetBT may fail to connect; Microsoft’s workaround is to allow TCP port 445 so the client and server can negotiate SMB over TCP instead of NetBT. Microsoft warns this impacts only SMBv1 over NetBT and notes SMBv2/SMBv3 are not affected.
Why this update matters (operational impact)
App‑V and virtualized Office deployments
App‑V remains in use in many enterprise app virtualization and VDI environments. A double handle closure in the App‑V subsystem that causes Office applications to fail is a material compatibility issue for organizations that publish Office via App‑V. For those customers, KB5068221 is effectively a high‑priority compatibility fix: it restores predictable behavior and reduces helpdesk traffic caused by Office crashes in App‑V sessions. Organizations that rely on App‑V should treat this update as a targeted patch and validate their published Office packages in a pilot ring before broad rollout.Cumulative + SSU packaging and rollback considerations
Because Microsoft bundles the SSU with the LCU in a single combined package, the conventional “wusa /uninstall” rollback doesn’t work for the entire package — the SSU portion is permanent. Administrators who need to remove the cumulative portion must use DISM /Remove‑Package with the precise package name. This distinction is operationally critical: test and pilot the update before deploying widely, and ensure your recovery playbooks include a documented DISM-based rollback path.Secure Boot certificate expiration reminder
KB5068221 reiterates the broader advisory that Windows Secure Boot certificates used by most Windows devices are set to begin expiring starting June 2026. Microsoft’s KB directs administrators to preparatory guidance for CA/KEK updates and recommends early planning to prevent unexpected Secure Boot or boot‑time failures on affected systems. This is not a fix inside KB5068221, but a timely reminder because the certificate‑rotation program is a multi‑stage process that can require firmware and OS coordination. Organizations must inventory devices for firmware updates and platform compatibility; failure to act before certificate expirations could lead to boot errors or inability to apply pre‑boot updates.Technical verification and cross‑checks
To ensure accuracy, the key technical claims in Microsoft’s KB were cross‑checked with independent community and reporting channels:- The release date, target build number (26100.6588), and the App‑V Office fix are published in the Microsoft KB page.
- Community reporting and forum tracking around the September servicing cycle describe the update as a short follow‑up cumulative to the large September 9 security rollup; that context is corroborated by community trackers and forum writeups that documented the broader September releases and subsequent hotpatches and out‑of‑band fixes. These community summaries also highlight similar operational concerns (SSU+LCU behavior, hotpatch eligibility, pilot/testing guidance).
- The SMBv1 over NetBT connectivity problem and the Secure Boot certificate expiration advisory were noted both in Microsoft’s official text and in community advisories and support threads tracking post‑September regressions and policy changes. Administrators should take Microsoft’s KB as authoritative, but community threads are useful for field reports of real‑world impact and workarounds while Microsoft produces a formal resolution.
Deployment guidance — recommended steps
- Inventory and identify affected systems
- Target: Windows 11 version 24H2 devices (all editions) that report earlier builds in the 26100 family. Prioritize App‑V hosts, VDI farms, and endpoints that run Office in App‑V containers.
- Pilot in a representative test ring
- Include App‑V environments, shared workstation images, and any systems still using legacy SMBv1/NetBT connectivity to network shares. Validate Office launch/repair behavior and SMB file access.
- Verify SSU and LCU file versions after install
- Use the file lists Microsoft provides (downloadable from the KB) to confirm correct versions and timestamps; ensure your inventory/CMDB records the new build (26100.6588) and SSU (26100.5074) for compliance reporting.
- If rollback is necessary, remove only the LCU
- Use DISM /online /get-packages to get the LCU package name, then DISM /online /Remove-Package /PackageName:<LCU‑package> to remove it. Do not attempt wusa /uninstall on the combined package because the SSU will remain. Test rollback in the pilot ring to confirm behavior.
- Address SMBv1 NetBT environments proactively
- For environments that still depend on SMBv1 over NetBT (NetBIOS name resolution), prepare to move them to SMB‑over‑TCP (port 445) or upgrade to SMBv2/SMBv3 by replacing legacy file‑sharing hosts. The KB provides a temporary workaround (allow TCP/445) but this should not be treated as a permanent fix.
- Secure Boot certificate rotation planning
- Begin firmware and platform checks now. If devices cannot accept the updated CA/KEK values through firmware updates, plan for exception handling or hardware refresh for the affected systems prior to June 2026. Consult your OEMs for device‑firmware timelines.
Risk analysis — strengths and potential pitfalls
Strengths
- Rapid response: Microsoft used an out‑of‑band release to address compatibility concerns after the September cumulative, which reduces operational friction for affected customers and prevents prolonged helpdesk churn for App‑V Office failures.
- Consolidated packaging: by bundling the SSU with the cumulative update, Microsoft reduces the chance of partial update states and improves long‑term servicing reliability on affected devices — provided administrators understand the rollback implications.
- Transparency about component versions and known issues: the KB includes explicit file information and a documented known issue (SMBv1 over NetBT), which helps enterprises plan mitigations and inventory changes.
Risks and operational caveats
- SMBv1 NetBT regression: organizations still using SMBv1 over NetBT risk immediate connectivity disruption unless they open TCP/445 or migrate away from NetBT. Because SMBv1 is deprecated, the incident may accelerate necessary migrations, but it also poses short‑term business continuity risks for legacy infrastructure.
- Rollback complexity: the SSU cannot be uninstalled. If the cumulative introduces an unforeseen regression, removal requires targeted DISM operations and careful validation. This limits rapid rollback options and increases the need for thorough piloting.
- Secure Boot certificate rotation complexity: the June 2026 expiration window means organizations must coordinate firmware updates, platform support, and OS updates in a multi‑vendor environment. Failure to plan could create boot issues; the timetable and device support status vary widely by OEM and model. Microsoft’s KB highlights the risk but implementation details are largely dependent on OEM firmware updates. This is a cross‑supply‑chain problem that requires active follow‑up.
- Hidden regressions: community reports after major rollups sometimes surface narrow, hardware‑ or driver‑specific regressions. The out‑of‑band release reduces some risk, but operational teams should still monitor telemetry and community channels for new reports after deployment.
Practical checks and verification commands
- Confirm installed build and OS version:
- Run: winver or
- Run in elevated PowerShell: (Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion").ReleaseId / or check BuildLabEx values to confirm OS Build 26100.6588.
- List installed packages to identify the LCU package name for potential removal:
- DISM /online /get-packages
- Identify the LCU package name (look for KB5068221 or a package with the reported build string).
- To remove the LCU (test only in pilot): DISM /online /Remove-Package /PackageName:<package>.
- Verify SSU version:
- Microsoft’s KB lists the SSU package name and version (KB5064531, version 26100.5074); confirm presence via the same DISM /get-packages output.
Recommended timeline and checklist for IT teams
- Day 0 (now): Read the KB, download the file lists, and note the exact package names and file versions for inventory matching.
- Day 1–3: Run a pilot on a small, representative set of machines:
- Include App‑V hosts, VDI golden images, and any systems still using SMBv1/NetBT.
- Validate Office App‑V sessions, file‑share access, boot behavior, and key business apps.
- Day 4–10: Expand to broader pilot if no regressions are found. Monitor logs for unexpected behavior (Event Viewer, Defender/EDR alerts, MSRC telemetry).
- Two weeks: Staged rollout across production windows. Maintain a rollback runbook using DISM-based steps.
- Immediately start Secure Boot/firmware inventory exercises if not already underway; coordinate with OEMs for certificate rotation support.
Final assessment
KB5068221 (OS Build 26100.6588) is a focused out‑of‑band cumulative that corrects a significant compatibility regression for App‑V Office deployments, refreshes selected AI components, and bundles a servicing stack update to ensure update reliability. Microsoft’s inclusion of a clear known‑issue entry (SMBv1 over NetBT) and the Secure Boot certificate expiration warning in the same KB makes this release both a corrective package and a reminder of longer‑term platform maintenance tasks.From an operational standpoint, the update is constructive: it addresses a real compatibility pain point and keeps devices on a supported servicing posture. At the same time, the SSU+LCU packaging model and the SM Bv1 regression underline the need for careful piloting, clear rollback runbooks (DISM‑based), and an accelerated plan to retire legacy SMBv1/NetBT dependencies. Enterprises should also treat the Secure Boot certificate rotation as a high‑impact program that will require coordination across firmware vendors, IT operations, and change management processes.
Administrators and power users should read the KB, download the file information Microsoft publishes, pilot the update on representative systems (particularly App‑V and VDI images), and start or continue Secure Boot certificate readiness activities well ahead of June 2026.
KB5068221 is available via Windows Update and the business distribution channels Microsoft lists in the KB; check your update management tooling for the package and ensure your inventory and compliance records reflect the new OS Build (26100.6588) after deployment.
Source: Microsoft Support September 22, 2025—KB5068221 (OS Build 26100.6588) Out-of-band - Microsoft Support